05550nam 2200757 450 991081431140332120230912123048.01-118-79083-91-118-79082-0(CKB)2670000000493621(EBL)1568423(SSID)ssj0001154134(PQKBManifestationID)11608875(PQKBTitleCode)TC0001154134(PQKBWorkID)11161725(PQKB)10156180(Au-PeEL)EBL1568423(CaPaEBR)ebr10809697(CaONFJC)MIL576412(OCoLC)865331162(Au-PeEL)EBL4444823(CaPaEBR)ebr11422807(OCoLC)1001387726(PPN)186164866(CaSebORM)9781118790823(MiAaPQ)EBC1568423(MiAaPQ)EBC4444823(EXLCZ)99267000000049362120131209d2014 uy 0engur|n|---|||||txtccrCarry on sound advice from schneier on security /Bruce Schneier1st editionIndianapolis, Indiana :Wiley,2014.©20141 online resource (378 p.)Description based upon print version of record.9781118790822 1-118-79081-2 Includes bibliographical references and index.Cover; Title Page; Copyright; Contents; Chapter 1 The Business and Economics of Security; Consolidation: Plague or Progress; Prediction: RSA Conference Will Shrink Like a Punctured Balloon; How to Sell Security; Why People Are Willing to Take Risks; How to Sell Security; Why Do We Accept Signatures by Fax?; The Pros and Cons of LifeLock; The Problem Is Information Insecurity; Security ROI: Fact or Fiction?; The Data Imperative; Caveat Emptor; Social Networking Risks; Do You Know Where Your Data Are?; Be Careful When You Come to Put Your Trust in the Clouds; Is Perfect Access Control Possible?News Media Strategies for Survival for JournalistsSecurity and Function Creep; Weighing the Risk of Hiring Hackers; Should Enterprises Give In to IT Consumerization at the Expense of Security?; The Vulnerabilities Market and the Future of Security; So You Want to Be a Security Expert; When It Comes to Security, We're Back to Feudalism; I Pledge Allegiance to the United States of Convenience; The Good, the Bad, and the Ugly; You Have No Control Over Security on the Feudal Internet; Chapter 2 Crime, Terrorism, Spying, and War; America's Dilemma: Close Security Holes, or Exploit Them OurselvesAre Photographers Really a Threat?CCTV Doesn't Keep Us Safe, Yet the Cameras Are Everywhere; Chinese Cyberattacks: Myth or Menace?; How a Classic Man-in-the-Middle Attack Saved Colombian Hostages; How to Create the Perfect Fake Identity; A Fetishistic Approach to Security Is a Perverse Way to Keep Us Safe; The Seven Habits of Highly Ineffective Terrorists; Why Society Should Pay the True Costs of Security; Why Technology Won't Prevent Identity Theft; Terrorists May Use Google Earth, but Fear Is No Reason to Ban It; Thwarting an Internal HackerAn Enterprising Criminal Has Spotted a Gap in the MarketWe Shouldn't Poison Our Minds with Fear of Bioterrorism; Raising the Cost of Paperwork Errors Will Improve Accuracy; So-Called Cyberattack Was Overblown; Why Framing Your Enemies Is Now Virtually Child's Play; Beyond Security Theater; Feeling and Reality; Refuse to Be Terrorized; Cold War Encryption Is Unrealistic in Today's Trenches; Profiling Makes Us Less Safe; Fixing Intelligence Failures; Spy Cameras Won't Make Us Safer; Scanners, Sensors Are Wrong Way to Secure the Subway; Preventing Terrorist Attacks in Crowded AreasWhere Are All the Terrorist Attacks?Hard to Pull Off; Few Terrorists; Small Attacks Aren't Enough; Worst-Case Thinking Makes Us Nuts, Not Safe; Threat of ""Cyberwar"" Has Been Hugely Hyped; Cyberwar and the Future of Cyber Conflict; Why Terror Alert Codes Never Made Sense; Debate Club: An International Cyberwar Treaty Is the Only Way to Stem the Threat; Overreaction and Overly Specific Reactions to Rare Risks; Militarizing Cyberspace Will Do More Harm Than Good; Rhetoric of Cyber War Breeds Fear-and More Cyber War; Attacks from China; GhostNet; ProfitableThe Boston Marathon Bombing: Keep Calm and Carry On Up-to-the-minute observations from a world-famous security expert Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon bombing, the NSA's ubiquitous surveillance programs, Chinese cyber-attacks, the privacy of cloud computing, and how to hack the Papal election. Timely as an Internet news report and always insightful, Schneier explains, debunks, and draws lessons from current events tSecurity systemsSecurity systemsCase studiesTerrorismCase studiesSecurity systems.Security systemsTerrorism363.28ST 277rvkSchneier Bruce60872MiAaPQMiAaPQMiAaPQBOOK9910814311403321Carry on3976144UNINA